CPSA Import Flashcards
CPSA Import
What is a passive OS fingerprinting technique
Monitoring network traffic using tools such as Wireshark for information re: the OS, also using p0f which is a tool that listens to network traffic and fingerprints OS based on characteristics of the packets
What is an active OS fingerprinting method
Using a port scanner like nmap
nmap flag to get OS details of target
-O for Operating System details
What is banner grabbing
A technique where attackers identify infrastructure details from headers, scans, etc.
How can we get application versions from a network
We can use a nmap scan with flag -sV to enable version detection
How can we get server types from banners
a cURL -I request will show the response headers which often includes a Server header, e.g: Server: Apache/2.4.41 (Ubuntu)
What is the difference between encryption and encoding
Encryption requires a secret key to be decrypted and is not reversible without it, whereas encoding means it uses a predefined scheme to convert data from one form to another with no key such as base64
What is encryption
Encryption involves using an algorithm and a key to transform plaintext into ciphertext. The process is reversible only if the correct decryption key is used
What is encoding
Encoding uses a predefined scheme to convert data from one form to another. The process is reversible without the need for a key\
What are the key factors that change between encoding and encryption
There are differences in reversiblity and levels of security
What are examples of encryption
RSA, AES
What are examples of encoding
Base64, ASCII, URL encoding
What is a hash
A hash is a cryptographic function that takes an input and returns a fixed size string of bytes, the same input will always produce the same output, known as a “digest”
What are the two most known hashes
MD5 and SHA1
Are MD5 and SHA1 considered secure
MD5 and SHA1 are considered insecure and unsuitable for most applications
Bit length of MD5
128-bit hash
What was MD5 designed for
MD5 was designed to be a cryptographic hash function used for integrity checking, digital signatures, etc
Why is MD5 considered insecure
Due to collision vulnerabilities, researchers found that MD5 is susceptible to collision attacks where two DIFFERENT inputs result in the same hash output
What is a collision vulnerability
Where two different inputs result in the same hash output
What is the real world risk of collision vulnerabilities in hashing
Being exploited in attacks such as creating malicious certificates that appear legitimate as they have the same MD5 hash as a trusted certificate
What is SHA1 bit size
160-bit hash
What was SHA1 designed for
Used to be widely used in cryptographic applications, including SSL/TLS certificates, file integrity validation
Why is SHA1 considered insecure
SHA1 is considered insecure as researchers demonstrated that two outputs can produce the same hash output
Is SHA1 considered secure
SHA1 is considered